INF-101 12/5/2023 (Social Media)
Branding
Involves creating a name and logo that differentiates one thing from the other.
It allows consumers to identify and distinguish products and services from one another.
Personal Branding
The process used by individuals to make them stand out from others.
It is a combination of how you present your unique traits via various communication means and how people perceive and remember you after meeting you.
Personal Website
Created by anyone wanting to enhance their digital brand image.
One of the most critical elements in building an awesome personal brand.
Creating a Personal Brand
Five things to build an awesome personal brand:
Check your online presence to discover what is out there about you.
Create a personal website and list it on your resume.
Think before you post anywhere.
Consider how you want to be perceived.
Create connections with the three Cs:
Company
College
Colleagues
Dimensions of Ethical Behavior
Accountants use five fundamental principles:
Integrity
Objectivity
Competence
Confidentiality
Professionalism
Manager’s five fundamental principles
Autonomy
Non-malfeasance
Beneficence
Justice
Fidelity
There are 5 dimensions of ethical behavior in the digital age.
Information rights
Copyrights and Intellectual Property
Control and Accountability
Establishing Standards
Quality of Life
Ergonomics
The study of human interaction with the objects they use.
Chapter 13 - Computer Security
Cybercrime
A criminal activity committed with a computer.
Two common cybercrimes:
Single-event
Ongoing series of events
Cyberattacks
A deliberate misuse of computers and networks
It uses malicious code to modify the normal operations of a computer or network.
Cybersecurity Threats
An event that potentially causes asset loss or the consequences or impact from that loss.
Cybersecurity Vulnerabilities
A weakness or flaw in system security design, implementation, and control that can be compromised by accident or intention.
System compromises can result in:
Security breaches
Lost information or data
System outages
Violations of an organization’s system
Cybersecurity Exploits
The way a system vulnerability can be used by a hacker to execute a malicious activity.
Breaches
Occurs when a hacker gains unauthorized access to an organization’s systems, data, and information.
Threat Mitigation
Includes policies and procedures to help prevent security incidents, data breaches, and unauthorized network access.
Cyberterrorists
Uses computers and the Internet to launch attacks against computer systems for political or ideological reasons.
Hackers
A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data.
Black hat hackers - Have the intent of causing or stealing data.
White hat hackers - policies computer security experts.
Malware
Malicious software.
The common types of malwares are:
Viruses
Worms
Trojan horses
Computer Viruses
Software that infects computers and is created using computer code.
They can destroy programs or alter the operations of a computer or network.
Macro Viruses
A virus that is written in a macro language and placed within a document or spreadsheet.
Trojans
A program that appears legitimate, but executes an unwanted activity when wanted.
Worms
A destructive program that replicates itself throughout a single computer or across a network.
It reproduces itself
Designed to attack both wired and wireless networks
Worm replication exhausts network bandwidth or available storage